The Power of Technology Partnerships

David Langton, VP Marketing & Alliances, identifies the power of Boldon James’ technology partnerships and the key role they play in supporting the business. The security and data management technology landscape is changing, and organisations are responding to this by integrating data classification to extend complimentary solutions. David discusses what drives the technology integration roadmap at Boldon James, including the types of partners we work with and the solutions we consider most complimentary to Boldon James Classifier and beneficial to our customers.

All firms licensed to do business with the State of New York must comply. Although state regulators have allowed a grace period, firms must show progress taking steps to conform to the new regulations.

Join InteliSecure's Chief Technology Officer, Jeremy Wittkop and Boldon James as they discuss what is contained in the regulation, who is in scope, how you can use people, processes, and technologies such as Boldon James to become more compliant, and some of the consequences associated with a failure to do so.

Today’s world of data protection and governance is awash with talk of machine learning and automation. But what about the role of the human in security, isn’t this being overlooked?

Join this interesting and insightful webinar with recognised speaker and author Bruce Hallas and data security expert Martin Sugden, CEO at Boldon James, who will explore how organisations need to empower the user and go beyond training and education to ensure human behaviours are positively influenced to deliver real security and business value.

Watch this webinar to learn:
• Learnings from research into the impact of human behaviour on user trust and security posture
• How to design a security approach that empowers humans
• The challenges associated with implementing security automation (e.g. AI/ML)
• Practical ways to engage the user to influence positive security behaviour

Recent innovations have made data security achievable for organizations of all sizes and industries. It’s now possible to quickly and effectively reduce the risk of data breaches and leaks.
Get up to speed with the 5 innovations every Security and IT professional should be aware of – to gain the confidence that their organization’s most sensitive information stays secure, these include:

In a world where data breaches are inevitable, EVERY organization is working to improve their security posture. Security organizations are looking to take advantage of artificial intelligence (AI) and machine learning (ML), but are overlooking the actual intelligence that resides in their HUMAN resources.

According to Palo Alto, AI and machine learning is primarily about automation and simplifying monotonous tasks associated with cyber security policy definition and enforcement. The words predictive, self-configuring and autonomic should all come to mind when thinking about AI/ML frameworks.

From a Boldon James perspective, end-user driven data classification affects security where the data begins and captures ACTUAL intelligence, namely the content and context, held by the creator of the data. Instead of relying on AI or machine learning to guess at the classification of data, organizations can harness the power of their HUMAN resources and engage the end-user in the security policy, making them responsible for classifying the data they create.

This webinar will focus on the power of end-users to:
1) Correctly classify data
2) Improve security posture
3) Reduce false positives in a DLP deployment
4) Reduce the time to remediate the results of data discovery
5) Increase the efficiency of virtually every element of a company’s security apparatus

New design files need to be protected so that data doesn't fall into the wrong hands, or the right ones too soon. CAD Classifier brings the benefits of data classification to key design documents across a variety of CAD applications, including AutoCAD and Draftsight, applying visual and metadata labels to guard against inappropriate dissemination.

Boldon James Box Classifier extends document classification into Box Cloud-based storage and sharing, ensuring organizations of all sizes have a unified and seamless solution for classification-based data protection and control regardless of its location.

Martin Sugden, CEO at Boldon James, explains how a best-of-breed data classification policy can be used to achieve organisational evolution. The way in which data classification contributes to the success of a business by involving the user community and bringing security to the forefront of their thinking, is a key topic of discussion. Also explored, is how best to approach the implementation of a data classification policy to achieve maximum value, how Boldon James’ solution differs from other technologies and furthermore, how it can evolve and grow with your business.

David Langton, VP Marketing & Alliances, identifies the power of Boldon James’ technology partnerships and the key role they play in supporting the business. The security and data management technology landscape is changing, and organisations are responding to this by integrating data classification to extend complimentary solutions. David discusses what drives the technology integration roadmap at Boldon James, including the types of partners we work with and the solutions we consider most complimentary to Boldon James Classifier and beneficial to our customers.

Paul Johnson, Vice President EMEA at Boldon James, identifies the key stages to achieving operational success in your organisation. The crucial difference between information and data, and the experiences our own clients have faced are just some of the things discussed in this video interview; which provides a detailed insight into how your user community can utilise data classification to improve business efficiency, workflow and compliance.

Luke Shutler, EMEA Channel Director at Boldon James, discusses how in the three months since its enforcement, GDPR has effected the way in which organisations are treating, and dealing with, their data. Specifically, how the new legislation has changed the way users think about data as a whole and furthermore, how they handle different types of organisational data. Also explored is how the use of data classification has facilitated change in these data processes, aiding compliance and improving efficiency among user communities.

Join Raymond Kelly our Account Director for Defence, Intelligence and NATO in a short video explaining the uses of military messaging, how the military messaging market is changing and what Boldon James are doing to stay at the forefront of it.

Boards of Directors who are highly engaged in security conversation, understand and enforce data classification policy because they understand that failure to strategically manage information creates more risk. Not everyone elevates data classification policies to the board level, but they should. Legal liabilities, cyber-insurance, regulatory requirements and financial investments are all driven by the lifecycle management of information. This level of dependency on classification of data means the discipline is not just an IT policy. It is corporate policy that requires the entire organization’s participation and ownership.

Join Renee Murphy, Principal Analyst, Security and Risk Management at Forrester, and Martin Sugden CEO at Boldon James, for a spirited conversation about the business need for classification and data lifecycle management to better manage operational risk.

How Data Classification can help support your Data Governance and Protection Initiatives.

Enterprises around the globe are creating and storing vast amounts of data as part of their daily business. Without classification of that data, enterprises are at risk of internal or external breaches of data. What’s worse, enterprise managers are working far harder than they need to without even knowing it.

Join guest speaker, Forrester Principal Analyst, Renee Murphy and Martin Sugden, CEO, Boldon James for a fun and lively conversation about data classification challenges and solutions for leveraging data classification across the enterprise for better technical operations management. If you are a CISO who has been told to do data classification, this webinar is for you.

Watch this webinar to learn:
• How the value data classification brings can extend beyond security
• How organizations can realize better technical operations management as a result of focusing on data classification
• Realize softer organizational benefits, such as improvements in awareness and security culture

How Data Classification can help support your Data Governance and Protection Initiatives.

Data classification is no longer a nice to have – it is a necessity – particularly with new data protection regulations like the GDPR just around the corner. Join us for this webinar featuring guest speaker Sue Robinson from Aspen Insurance, who have recently implemented a best-of-breed data classification solution across their organisation globally.

Watch this webinar to learn:
• How to approach a data classification project
• Learnings from planning and implementing a data classification project
• How data classification supports more effective data governance
• What to consider when evaluating a classification solution

You’ve heard it over and over again how securing the network, applications and devices is just not enough. Focusing only on stopping break-ins to your network leaves your data vulnerable when an intruder finds a back door way in. But what happens when your data leaves the front gate to conduct business with contractors, suppliers, partners, etc.

In this one hour webcast, you’ll learn how to build a strong Data-Centric Security strategy by classifying sensitive information and automatically applying security controls to the data whether it stays inside or outside your castle. Join Seclore and Boldon James to learn how to:

Apply visual and metadata classification labels to clearly identify sensitive data
Automatically add persistent protection to sensitive data based on policy rules
Control access and usage to sensitive data wherever it travels
Stay compliant with real time audits of file access and usage

Overview video on controlling sensitive information being uploaded to cloud storage, protecting non text based documents such as CAD drawing files and how McAfee's ePolicy Orchestrator (ePO) works with Classifier.

For many organizations, classification of legacy content presents a difficult challenge to overcome as well as being a critical compliance issue. Now there is an easy solution.

Join us to learn how integrating Boldon James Classifier with STEALTHbits’ solutions enables organizations to automatically identify and tag legacy documents, making users fully aware of data sensitivity and compliance requirements (e.g. GDPR, NYDFS, NIST, CUI etc), meaning appropriate security policies are enforced on classified content such that only the right people have access to the right information.